Infosecurity Opinions

  1. Why Do VPNs Need To Be GDPR Compliant?

    Now GDPR has been in force for over a month, why do VPNs need to be compliant too?

    1. Photo of Anas Baig

      Anas Baig

      Security Consultant

  2. Security Automation Soars to Top of Agenda

    Security orchestration, automation and response platforms need careful consideration in easing the security management burden.

    1. Photo of Sander Barens

      Sander Barens

      Vice President of Development at Expereo

  3. How Pseudonymous Reputation and the Dark Web Have Made Cybercrime Easier Than Ever

    Today an array of marketplaces, infrastructure, and technology empower much more ordinary actors to commit crime on a massive scale with impunity.

    1. Michael Tiffany

      Co-founder & President, WhiteOps

  4. The Inefficient Battle Against Phishing Attacks and the Technology to Turn the Tides of War

    When enough people flag a sender as spam, they will be blacklisted, but it's important for providers to constantly adapt and block spammer accounts.

    1. Photo of Andrew Goldberg

      Andrew Goldberg

      Chief Scientist at Inky Phish Fence

  5. A New Approach to Data Breach Prevention: Early and Pervasive Breach Detection

    The earlier you can detect a cyber-attack, the higher the probability of preventing data breaches. So what is preventing that early detection?

    1. Photo of John Peterson

      John Peterson

      Chief Product Officer at Aella Data

  6. Detecting and Responding to Cryptojacking with Artificial Intelligence

    How artificial intelligence can help to detect and respond to cyber-criminals harnessing computer power to mine cryptocurrency.

    1. Photo of Matt Walmsley

      Matt Walmsley

      EMEA Director at Vectra Networks

  7. In Bots We Trust: Better Enterprise Security Through AI

    Post GDPR and pre AI, the enterprise needs to entirely transform its thinking about security.

    1. Chris Sussman

      SVP, Operations, Verint Intelligent Self-Service

  8. The Next Big Lesson for Security: Context is King

    We need higher-fidelity alerts contextualized across multiple facets of a system.

    1. Photo of David Pearson

      David Pearson

      Principal Threat Researcher, Awake Security

  9. Security's Role in the Shift Left in Application Security

    As the DevSecOps process requires developers to take greater responsibility for securing software as well as building it, consideration must be given as to what this means for members of the security team.

    1. Photo of Paul Farrington

      Paul Farrington

      Director, EMEA solution architects, Veracode

  10. GDPR: Don't Rest on Your Data, We've Only Just Begun

    May 25 was the starting line, we never know which way regulators and legislators are going to go until they act.

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  11. Crack Cyber Attack Cases ...with Terror Attack Investigation Tactics

    Five lessons on how to replicate terror investigations for the benefit of cyber.

    1. Photo of Noam Rosenfeld

      Noam Rosenfeld

      Senior Vice President Research and Development, Cyber Intelligence Solutions, Verint Systems

  12. Access all Areas - Not Anymore!

    Unauthorized access to data is a huge downfall for many businesses.

    1. Photo of Simon Cuthbert

      Simon Cuthbert

      Head of International, 8MAN by Protected Networks

  13. Must Have Factors of a Mobile Security Policy

    Tips on how to build a mobile security policy.

    1. Photo of Alexa Lemzy

      Alexa Lemzy

      Customer support manager at TextMagic

  14. Why Life Under GDPR will Encourage Technology Innovation

    The GDPR is the first step as data protection evolves from compliance to accountability – creating opportunities to develop new services as well as to improve public perceptions.

    1. Photo of James Wickes

      James Wickes

      CEO and co-founder of Cloudview

  15. Do It Yourself? Could be a Painful Experience

    A decision to buy will always be affected by whether or not you trust a vendor.

    1. Photo of Mike MacIntyre

      Mike MacIntyre

      Chief Scientist, Panaseer

  16. Security at the Speed of Business

    Bringing security professionals into the business conversation as early as possible will allow them to lay out a plan where the business can grow but also be secure,

    1. Photo of Craig Riddell

      Craig Riddell

      Senior solutions architect, SSH Communications Security

  17. Batten Down the Hatches against Crypto-Mining Pirates

    Cryptocurrency pirates are happy to steal computational power to do it, and they don’t care who they hurt in the process.

    1. Photo of Aaron McKee

      Aaron McKee

      Director of Cybersecurity and Threat Analytics at Cyxtera

  18. We’re Losing the Race to Patch Known Security Flaws: Will GDPR Help?

    Virtual Patching is emerging as a solution to the problem of too many unapplied software fixes.

    1. Photo of James E. Lee

      James E. Lee

      Executive Vice-President, Waratek

  19. How Much do Passwords Cost your Business?

    The cost of supporting password systems, including staffing and infrastructure, can be significant for today’s digital businesses

    1. Sandor Palfy

      CTO, Lastpass

  20. DMARC Will Not Make Email Secure

    DMARC will make little, if any, difference in improving email security respecting phishing because DMARC inadequately addresses both the technical proficiency of dedicated threat actors and their tools of psychological manipulation.

    1. Photo of Robert Zager

      Robert Zager

      Security Researcher at Iconix

What’s hot on Infosecurity Magazine?